Cargando…

Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †

Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better ac...

Descripción completa

Detalles Bibliográficos
Autores principales: Han, Daoqi, Du, Xiaofeng, Lu, Yueming
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218864/
https://www.ncbi.nlm.nih.gov/pubmed/32326501
http://dx.doi.org/10.3390/s20082231